Skip to main content
Mallory

AVideo Flaws Enable Remote Code Execution via Command Injection and Malicious Plugin Upload

internet-facing-service-vulnerabilityinitial-access-methodpersistence-method
Updated March 23, 2026 at 07:03 PM2 sources
Share:
AVideo Flaws Enable Remote Code Execution via Command Injection and Malicious Plugin Upload

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

WWBN AVideo versions up to and including 26.0 are affected by two high-severity flaws that can lead to remote code execution. CVE-2026-33482 is an OS command injection bug in sanitizeFFmpegCommand(), which strips some shell metacharacters but fails to remove bash command substitution using $(). Because the resulting ffmpeg command is later executed in a double-quoted sh -c context by execAsync(), an attacker able to craft a valid encrypted payload can run arbitrary commands on the standalone encoder server.

A separate issue, CVE-2026-33507, allows unauthenticated code execution through the plugin import workflow. The objects/pluginImport.json.php endpoint permits admin users to upload and install plugin ZIP archives containing executable PHP, but lacks CSRF protection; with session.cookie_samesite = 'None' on HTTPS connections, an attacker can trick a logged-in administrator into silently importing a malicious plugin and deploying a PHP webshell. Fixes were introduced in commits 25c8ab90269e3a01fb4cf205b40a373487f022e1 and d1bc1695edd9ad4468a48cea0df6cd943a2635f3.

Timeline

  1. Mar 23, 2026

    CVE-2026-33507 CSRF plugin upload RCE in AVideo publicly disclosed

    A high-severity AVideo vulnerability was publicly disclosed showing that missing CSRF protection on objects/pluginImport.json.php could let an unauthenticated attacker induce an administrator to upload a malicious plugin and gain code execution. The issue affects versions up to and including 26.0.

  2. Mar 23, 2026

    CVE-2026-33482 command injection in AVideo publicly disclosed

    A high-severity vulnerability in WWBN AVideo was publicly disclosed describing how incomplete sanitization in sanitizeFFmpegCommand() could allow arbitrary command execution on the standalone encoder server. The issue affects versions up to and including 26.0.

  3. Mar 23, 2026

    AVideo CSRF-to-RCE plugin import flaw patched in commit d1bc169

    WWBN AVideo fixed a CSRF vulnerability affecting versions up to and including 26.0 in the plugin import endpoint, which could let an attacker trick a logged-in administrator into uploading a malicious plugin and achieve remote code execution. The patch was included in commit d1bc1695edd9ad4468a48cea0df6cd943a2635f3.

  4. Mar 23, 2026

    AVideo command injection flaw patched in commit 25c8ab9

    WWBN AVideo fixed an OS command injection vulnerability affecting versions up to and including 26.0, where sanitizeFFmpegCommand() failed to block $() shell substitution before execution in a sh -c context. The patch was introduced in commit 25c8ab90269e3a01fb4cf205b40a373487f022e1.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

AVideo Flaws Enable Unauthenticated Takeover and SSRF on Exposed Deployments

AVideo Flaws Enable Unauthenticated Takeover and SSRF on Exposed Deployments

WWBN **AVideo** versions `25.0` and earlier were found to contain two high-severity vulnerabilities that can be exploited without authentication. `CVE-2026-33038` allows full application takeover on uninitialized deployments because the exposed `install/checkConfiguration.php` endpoint can accept unauthenticated `POST` data to complete setup, create an administrator account, configure the database, and write the application's configuration file. Systems that have not yet created `videos/configuration.php` are especially at risk, as an attacker can initialize the platform with attacker-controlled credentials and infrastructure, gaining full administrative access. A second flaw, `CVE-2026-33039`, affects the `plugin/LiveLinks/proxy.php` endpoint and enables **server-side request forgery (SSRF)** through an HTTP redirect bypass. AVideo validates only the initial user-supplied URL, but does not re-validate redirect targets fetched by the proxy logic, allowing attackers to reach internal resources such as **RFC1918** addresses and cloud metadata services. Both issues were addressed in **AVideo `26.0`**, with the takeover bug classified as `CWE-306` and the SSRF bug as `CWE-918`.

1 weeks ago
Unauthenticated OS Command Injection in AVideo via `base64Url` Parameter

Unauthenticated OS Command Injection in AVideo via `base64Url` Parameter

A critical, **zero-click unauthenticated OS command injection** vulnerability was disclosed in the open-source video hosting/streaming platform **AVideo**, tracked as **CVE-2026-29058**. The flaw affects versions **prior to 7.0** (including **6.0**) and allows remote attackers to execute arbitrary operating system commands on the server without user interaction or prior privileges, creating a path to **full server compromise**, **data exfiltration** (e.g., configuration secrets, internal keys, credentials), and **service disruption**. The issue stems from `objects/getImage.php`, where attacker-controlled input in the `base64Url` GET parameter is Base64-decoded and incorporated into a double-quoted `ffmpeg` shell command without proper escaping/neutralization of shell metacharacters and command substitution (CWE-78). The vulnerability was reported by security researcher **Arkmarta**, and remediation is available by upgrading to **AVideo 7.0 or later**, which includes the official patch.

1 months ago
AVideo CloneSite Flaws Enable File Deletion and Unauthenticated RCE

AVideo CloneSite Flaws Enable File Deletion and Unauthenticated RCE

WWBN **AVideo** was found to contain multiple high-severity flaws in its `CloneSite` plugin that can be abused for destructive attacks and full server compromise. One issue, tracked as `CVE-2026-33293`, affects versions prior to **26.0** and allows arbitrary file deletion through path traversal in the `deleteDump` parameter of `plugin/CloneSite/cloneServer.json.php`. Because the value was passed directly to `unlink()` without sanitization, an attacker with valid clone credentials could use `../../` sequences to remove arbitrary files such as `configuration.php`, causing denial of service and potentially weakening other protections. A second issue, `CVE-2026-33478`, describes a broader attack chain in AVideo versions up to and including **26.0** that can lead to **unauthenticated remote code execution**. The `clones.json.php` endpoint exposed clone secret keys without authentication, which could then be used to trigger a full database dump via `cloneServer.json.php`; the dump reportedly included admin password hashes stored as **MD5**, enabling attackers to recover credentials and gain administrative access. From there, an OS command injection flaw in `cloneClient.json.php` involving `rsync` command construction could be used to execute arbitrary system commands. The vulnerabilities were mapped to `CWE-22`, `CWE-78`, and `CWE-284`, and fixes were released by WWBN, including a patch referenced in commit `c85d076375fab095a14170df7ddb27058134d38c`.

1 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

AVideo Flaws Enable Remote Code Execution via Command Injection and Malicious Plugin Upload | Mallory